Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Context of Cryptography
Introduction to Cryptography
13 other sections not shown
Other editions - View all
128-bit security level algorithm Alice and Bob authentication birthday attack bits long block cipher mode bytes cache certificate choose a random ciphertext blocks clock collision attacks communication compute counter cryptographic protocols cryptographic systems decryption discuss divisor easy encryption encryption function ensure entropy hash function HMAC ideal block cipher implement input integer key negotiation protocol key server key size key stream large number leak MAC function memory message number modulo multiple nonce operating system output padding password patent plaintext blocks pool prime PRNG problem public key random data random number requires reseed result S-boxes safe prime secret key secure channel security system seed file Serpent SHA family simple situation solution sources specifications standard stream cipher string subgroup Twofish UMAC wipe XSL attacks
Codes: The Guide to Secrecy From Ancient to Modern Times
Richard A. Mollin
Limited preview - 2005
All Book Search results »
Reconciling Information Exchange and Confidentiality — A Formal Approach
Limited preview - 2007